Lightweight and Privacy-Preserving Delegatable Proofs of Storage
暂无分享,去创建一个
Duncan S. Wong | Jia Xu | Jianying Zhou | Anjia Yang | D. Wong | Jianying Zhou | Jia Xu | Anjia Yang | Jian Weng | Jianying Zhou
[1] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[2] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[3] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[4] Oded Goldreich,et al. A Sample of Samplers - A Computational Perspective on Sampling (survey) , 1997, Electron. Colloquium Comput. Complex..
[5] Elaine Shi,et al. Practical dynamic proofs of retrievability , 2013, CCS.
[6] M. AdelsonVelskii,et al. AN ALGORITHM FOR THE ORGANIZATION OF INFORMATION , 1963 .
[7] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[8] Jia Xu,et al. Towards efficient proofs of retrievability , 2012, ASIACCS '12.
[9] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[11] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[12] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[13] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[14] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[15] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[16] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[18] Duncan S. Wong,et al. Lightweight Delegatable Proofs of Storage , 2016, ESORICS.
[19] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[20] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[21] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[22] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[23] Yihua Zhang,et al. Efficient dynamic provable possession of remote data via balanced update trees , 2013, ASIA CCS '13.
[24] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[25] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[26] Florian Kerschbaum,et al. Symmetric-Key Based Proofs of Retrievability Supporting Public Verification , 2015, ESORICS.
[27] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[28] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[29] Shucheng Yu,et al. Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.
[30] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[31] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[32] Ke Zeng,et al. Publicly Verifiable Remote Data Integrity , 2008, ICICS.
[33] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[34] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[35] Jin Liu,et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.
[36] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[37] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[38] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[39] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[40] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[41] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[42] Alex J. Malozemoff,et al. Implementing Cryptographic Program Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[43] R. Ramesh,et al. A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2016 .
[44] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[45] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[46] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[47] Hao Yan,et al. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[48] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[49] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[50] Stephen S. Yau,et al. Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.
[51] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).